Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

S Rustad, PN Andono, GF Shidik - Signal processing, 2023 - Elsevier
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …

A survey of recent advances in image steganography

A Kumar, R Rani, S Singh - Security and Privacy, 2023 - Wiley Online Library
Over the course of technological development, data security while transmission and storing
has always been a field of continuous advancements and key importance. In the recent …

A novel steganographic technique for medical image using SVM and IWT

P Chowdhuri, P Pal, T Si - Multimedia Tools and Applications, 2023 - Springer
This study presents an efficient authentication scheme for digital image steganography on
medical images benefiting from the combination of both techniques: Support Vector Machine …

Multi Perspectives Steganography Algorithm for Color Images on Multiple-Formats

S Rahman, J Uddin, H Hussain, S Jan, I Khan… - Sustainability, 2023 - mdpi.com
The Internet and Big Data expansion have motivated the requirement for more generous
stockpiling to hold and share information. Against the current era of information …

A discrete wavelet transform-based audio watermarking technique for digital security

V Prabhu, L Sundar, V Drishya… - International …, 2022 - inderscienceonline.com
This work proposes a model using discrete wavelet transform (DWT) to eliminate the attacks
on digital security. Semi-fragile watermarking techniques strive towards establishing the …

SE-SIS: Shadow-Embeddable Lossless Secret Image Sharing for Greyscale Images

Z Xu, B Liu, F Hu, W Li, N Yu - ICASSP 2024-2024 IEEE …, 2024 - ieeexplore.ieee.org
Secret image sharing (SIS) has made significant progress in research and has found wide
applications. However, we note that shadows of traditional SIS contain a large amount of …

[PDF][PDF] The Effect of DNA in Image Steganography on Privacy Preservation in Smart City

HE Rostam, H Motameni, R Enayatifar - J. Appl. Dyn. Syst. Control, 2022 - journals.iau.ir
The smart city is one of the Internet of Thing based application that its use is increasing
today. One of the requirements of this system is privacy which protects citizens from …

Multi-Carrier Information Hiding Algorithm Based on GHM Multiwavelet Transform and Singular Value Decomposition

S Ren, Q Feng, M Wang - … of the 6th International Conference on …, 2022 - dl.acm.org
Aiming at the problem that the single-carrier information hiding algorithm is limited by the
number of carriers, and its capacity and security cannot be further broken through, a digital …

Research and Application of Blind Watermark Based on DCT

R Zhang, S Yuan - 2023 IEEE 9th Intl Conference on Big Data …, 2023 - ieeexplore.ieee.org
As the content of electronic documents has become increasingly important and prominent in
the present day, most companies or enterprises pay more and more attention to the security …

Stego Dog: Image Steganography Tool for Confidentiality and Integrity

V Parmar, D Gandhi, A Srivastava… - … Computing and Data …, 2022 - ieeexplore.ieee.org
With the fast-growing digital world in the pandemic scenario, there is a concern for data
security when it crosses through various unbarred communication media. The data, the most …